Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp5968635ybe; Tue, 10 Sep 2019 11:29:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqzMU1sBXDvebbPkvppv0pbET/GH55np9kojQYP6DMEaKRnVfVNqqjBN35XoETjpeTzqeU0S X-Received: by 2002:aa7:df17:: with SMTP id c23mr32748796edy.239.1568140177639; Tue, 10 Sep 2019 11:29:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568140177; cv=none; d=google.com; s=arc-20160816; b=NOKFaICLvhRJuVOh4UGLMKRd0qCdz7dz3U17ybPqQ+zft3amKQ+/3vFgzszyJmYBLy AzrDz0TYjlglR8WMSIiMfnCJKKr/PQouAOTidlinOWjQIMMhRaEYac6+2lwNLTqb5UJV i7DUOOyNolIW8LRBrJGaHBCHHWfGHuE1+xyMfRHopvaCBsnAK8lRAG9ziQXL/huxXwNs 0qkdyv3gNx6zkSaNZXILdooThk8f2ruUMNQqjoIjn/5Os5OxsTeVOqM073uuwC7dOFFA VQDRk5/P2Tio6U/9VI4p4/zMNXyQdWAwT9I2C0nebYtkPpD2sMoHCKMorOytVaug0A+0 C1EQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=hzrialAtk0obgpiBBAkGiH/mM/fw/mUuKVX/3AGE0kQ=; b=dVreCpiiZsMgfwKdKzMxI32YxP14UirfKPpikGiaC0iUIxp+mFvaeSLebnFCv2R6Hu NWKrXyt37Sqf/D9K2V4C9upJoOCfzqXvMKe3ytGfSmebLMmEGz5bYiO7UjUH6I77VCbB cDB+/HCM4mi3TtfTFrI0t0U2i4+SJjn2ICjytv68E1lw7dUGk7R3kU8W7Ztj+ZgLcs/x g+sgMirDWM740ItXXRTAc2wBaAtqHA13qKzBgbpOinQbeopaZeGEKZFlkTObJDs86N7H 2amAY5cp8kbvpO0jl52HSIqZHPYmNwnh3ML1mUY0ko5ozAjmprDk2JB6rlSxKCPqK3hB UT5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j35si11905247eda.144.2019.09.10.11.29.13; Tue, 10 Sep 2019 11:29:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728108AbfIIPIl (ORCPT + 99 others); Mon, 9 Sep 2019 11:08:41 -0400 Received: from mx2.suse.de ([195.135.220.15]:36404 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725875AbfIIPIl (ORCPT ); Mon, 9 Sep 2019 11:08:41 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id D7039AFBB; Mon, 9 Sep 2019 15:08:38 +0000 (UTC) Subject: Re: [PATCH 4/5] mm, slab_common: Make 'type' is enum kmalloc_cache_type To: Pengfei Li , akpm@linux-foundation.org Cc: cl@linux.com, penberg@kernel.org, rientjes@google.com, iamjoonsoo.kim@lge.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <20190903160430.1368-1-lpf.vector@gmail.com> <20190903160430.1368-5-lpf.vector@gmail.com> From: Vlastimil Babka Message-ID: <02c8e192-542c-4225-4718-67cc00f4dc17@suse.cz> Date: Mon, 9 Sep 2019 17:08:38 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190903160430.1368-5-lpf.vector@gmail.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/3/19 6:04 PM, Pengfei Li wrote: > The 'type' of the function new_kmalloc_cache should be > enum kmalloc_cache_type instead of int, so correct it. OK > Signed-off-by: Pengfei Li Acked-by: Vlastimil Babka > --- > mm/slab_common.c | 5 +++-- > 1 file changed, 3 insertions(+), 2 deletions(-) > > diff --git a/mm/slab_common.c b/mm/slab_common.c > index 8b542cfcc4f2..af45b5278fdc 100644 > --- a/mm/slab_common.c > +++ b/mm/slab_common.c > @@ -1192,7 +1192,7 @@ void __init setup_kmalloc_cache_index_table(void) > } > > static void __init > -new_kmalloc_cache(int idx, int type, slab_flags_t flags) > +new_kmalloc_cache(int idx, enum kmalloc_cache_type type, slab_flags_t flags) > { > if (type == KMALLOC_RECLAIM) > flags |= SLAB_RECLAIM_ACCOUNT; > @@ -1210,7 +1210,8 @@ new_kmalloc_cache(int idx, int type, slab_flags_t flags) > */ > void __init create_kmalloc_caches(slab_flags_t flags) > { > - int i, type; > + int i; > + enum kmalloc_cache_type type; > > for (type = KMALLOC_NORMAL; type <= KMALLOC_RECLAIM; type++) { > for (i = KMALLOC_SHIFT_LOW; i <= KMALLOC_SHIFT_HIGH; i++) { >